Crime Toolkits: The Current Threats to Web Applications
暂无分享,去创建一个
[1] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[2] Veelasha Moonsamy,et al. Analysis of malicious and benign android applications , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[3] Jemal H. Abawajy,et al. Web application protection against SQL injection attack , 2011, ICIT 2011.
[4] Tracey Caldwell. Ethical hackers: putting on the white hat , 2011, Netw. Secur..
[5] Mamoun Alazab,et al. Towards Understanding Malware Behaviour by the Extraction of API Calls , 2010, 2010 Second Cybercrime and Trustworthy Computing Workshop.
[6] Mauro Coccoli,et al. Social Network Engineering for Secure Web Data and Services , 2013 .
[7] Jemal H. Abawajy,et al. Using feature selection for intrusion detection system , 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT).
[8] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.